Deck 3: Legal, Ethical, and Professional Issues in Information Security

Full screen (f)
exit full mode
Question
The Information Systems Security Association (ISSA)is a nonprofit society of information security professionals whose primary mission is to bring together qualified information security practitioners for information exchange and educational development.
Use Space or
up arrow
down arrow
to flip the card.
Question
Every state has implemented uniform laws and regulations placed on organizational use of computer technology.
Question
Established in January 2001,the National InfraGard Program began as a cooperative effort between the FBI's Cleveland Field Office and local technology professionals.
Question
There are four general causes of unethical and illegal behavior.
Question
The key difference between laws and ethics is that ethics carry the authority of a governing body and laws do not.
Question
Studies on ethics and computer use reveal that people of different nationalities have different perspectives;difficulties arise when one nationality's ethical behavior violates the ethics of another national group.
Question
Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident.
Question
DHS is made up of three directorates.
Question
The United States has implemented a version of the DMCA law called the Database Right,in order to comply with Directive 95/46/EC.
Question
The Secret Service is charged with the detection and arrest of any person committing a United States federal offense relating to computer fraud and false identification crimes.
Question
Thirty-four countries have ratified the European Council Cyber-Crime Convention as of April 2010.
Question
The NSA is responsible for signal intelligence and information system security.
Question
Cultural differences can make it easy to determine what is and is not ethical-especially when it comes to the use of computers.
Question
The Association for Computing Machinery and the Information Systems Security Association have the authority to banish violators of their ethical standards from practicing their trade.
Question
Studies have reported that the Pacific Rim countries of Singapore and Hong Kong are hotbeds of software piracy.
Question
HIPAA specifies particular security technologies for each of the security requirements to ensure the privacy of the health-care information.
Question
The difference between a policy and a law is that ignorance of a law is an acceptable defense.
Question
Due care requires that an organization make a valid effort to protect others and continually maintain this level of effort.
Question
The Clipper Chip can be used to monitor or track private communications.
Question
The Department of Homeland Security is the only U.S.federal agency charged with the protection of American information resources and the investigation of threats to,or attacks on,the resources.
Question
____ law regulates the structure and administration of government agencies and their relationships with citizens,employees,and other governments.

A)Public
B)Private
C)Civil
D)Criminal
Question
____ law comprises a wide variety of laws that govern a nation or state.

A)Criminal
B)Civil
C)Public
D)Private
Question
The U.S.Secret Service is a department within the Department of the Interior._________________________
Question
The Federal Bureau of Investigation's National InfraGard Program serves its members in four basic ways: Maintains an intrusion alert network using encrypted e-mail;Maintains a secure Web site for communication about suspicious activity or intrusions;Sponsors local chapter activities;Operates a help desk for questions._________________________
Question
The National Information Infrastructure Protection Act of 1996 modified which Act?

A)USA PATRIOT Act
B)USA PATRIOT Improvement and Reauthorization Act
C)Computer Security Act
D)Computer Fraud and Abuse Act
Question
In a study on software licence infringement,those from United States were significantly more permissive._________________________
Question
Deterrence can prevent an illegal or unethical activity from occurring._________________________
Question
The communications networks of the United States carry more funds than all of the armored cars in the world combined._________________________
Question
In 1995 the Directive 95/46/EC was adopted by the European Union._________________________
Question
Intellectual privacy is recognized as a protected asset in the United States._________________________
Question
The code of ethics put forth by (ISC)² focuses on four mandatory canons: "Protect society,the commonwealth,and the infrastructure;act honorably,honestly,justly,responsibly,and legally;provide diligent and competent service to principals;and advance and protect the profession."._________________________
Question
The Department of Homeland Security was created in 1999._________________________
Question
The Federal Privacy Act of 1974 regulates government agencies and holds them accountable if they release information about national security._________________________
Question
Civil law addresses activities and conduct harmful to society and is actively enforced by the state._________________________
Question
The Economic Espionage Act of 1996 protects American ingenuity,intellectual property,and competitive advantage._________________________
Question
The Computer ____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.

A)Violence
B)Fraud
C)Theft
D)Usage
Question
Ethics define socially acceptable behaviors._________________________
Question
Privacy is not absolute freedom from observation,but rather is a more precise "state of being free from unsanctioned intrusion." _________________________
Question
According to the National Information Infrastructure Protection Act of 1996,the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except ____.

A)for purposes of commercial advantage
B)for private financial gain
C)to harass
D)in furtherance of a criminal act
Question
The Graham-Leach-Bliley Act is a critical piece of legislation that affects the executive management of publicly traded corporations and public accounting firms.______________________________
Question
Guidelines that describe acceptable and unacceptable employee behaviors in the workplace are known as ____________________.
Question
____________________ is the legal obligation of an entity that extends beyond criminal or contract law.
Question
Criminal or unethical ____ goes to the state of mind of the individual performing the act.

A)attitude
B)intent
C)accident
D)ignorance
Question
Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?

A)Financial Services Modernization Act
B)Communications Act
C)Computer Security Act
D)Economic Espionage Act
Question
____ attempts to prevent trade secrets from being illegally shared.

A)Electronic Communications Privacy Act
B)Sarbanes-Oxley Act
C)Financial Services Modernization Act
D)Economic Espionage Act
Question
Which of the following acts defines and formalizes laws to counter threats from computer related acts and offenses?

A)Electronic Communications Privacy Act of 1986
B)Freedom of Information Act (FOIA)
C)Computer Fraud and Abuse Act
D)Federal Privacy Act of 1974
Question
Which of the following acts is a collection of statutes that regulate the interception of wire,electronic,and oral communications?

A)Electronic Communications Privacy Act
B)Financial Services Modernization Ac
C)Sarbanes-Oxley Act
D)Economic Espionage Act
Question
"Long arm ____________________" refers to the long arm of the law reaching across the country or around the world to draw an accused individual into its court systems.
Question
The ____ Portability and Accountability Act Of 1996,also known as the Kennedy-Kassebaum Act,protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.

A)Customer
B)Health Insurance
C)Computer
D)Telecommunications
Question
The ____ of 1999 provides guidance on the use of encryption and provides protection from government intervention.

A)Sarbanes-Oxley Act
B)Gramm-Leach-Bliley Act
C)U.S.A.Patriot Act
D)Security and Freedom through Encryption Act
Question
Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage ____.

A)with intent
B)by accident
C)with malice
D)with negligence
Question
The Privacy of Customer Information Section of the common carrier regulation states that any proprietary information shall be used explicitly for providing services,and not for any ____ purposes.

A)troubleshooting
B)billing
C)customer service
D)marketing
Question
What is the subject of the Sarbanes-Oxley Act?

A)Banking
B)Financial Reporting
C)Privacy
D)Trade secrets
Question
____ defines stiffer penalties for prosecution of terrorist crimes.

A)USA Patriot Act
B)Sarbanes-Oxley Act
C)Gramm-Leach-Bliley Act
D)Economic Espionage Act
Question
____________________ are rules that mandate or prohibit certain behavior in society.
Question
The Council of Europe adopted the Convention of Cybercrime in ____.

A)1976
B)1986
C)1998
D)2001
Question
Which of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources?

A)Australia
B)United States
C)Singapore
D)Sweden
Question
Laws and policies and their associated penalties only deter if which of the following conditions is present?

A)Fear of penalty
B)Probability of being caught
C)Probability of penalty being administered
D)All of the above
Question
What is the subject of the Computer Security Act?

A)Federal Agency Information Security
B)Telecommunications Common Carriers
C)Cryptography Software Vendors
D)Banking Industry
Question
____________________ are the fixed moral attitudes or customs of a particular group.
Question
Software license infringement is also often called software ____________________.
Question
The ____________________ Act seeks to improve the reliability and accuracy of financial reporting,as well as increase the accountability of corporate governance,in publicly traded companies.
Question
The ______________________________ contains a number of provisions focusing on facilitating affiliation among banks,securities firms,and insurance companies.
Question
The ________________________________________ is the American contribution to an international effort to reduce the impact of copyright,trademark,and privacy infringement,especially when accomplished via the removal of technological copyright protection measures.
Question
The ____________________ Act of 1996 attempts to prevent trade secrets from being illegally shared.
Question
The ___________________________________ is a respected professional society that was established in 1947 as "the world's first educational and scientific computing society."
Question
The low overall degree of tolerance for ____________________ system use may be a function of the easy association between the common crimes of breaking and entering,trespassing,theft,and destruction of property to their computer-related counterparts.
Question
The ____________________ Act of 2001 provides law enforcement agencies with broader latitude in order to combat terrorism-related activities.
Question
Family law,commercial law,and labor law are all encompassed by ____________________ law.
Question
The ________________________________________________________________________________² manages a body of knowledge on information security and administers and evaluates examinations for information security certifications.
Question
The ________________________________________ Association is a professional association that focuses on auditing,control,and security and whose membership comprises both technical and managerial professionals.
Question
List three of the provisions included in the Security And Freedom Through Encryption Act of 1999.
Question
What are the requirements for a policy to become enforceable?
Question
The _________________________ Act of 1966 allows any person to request access to federal agency records or information not determined to be a matter of national security.
Question
Key studies reveal that the overriding factor in leveling the ethical perceptions within a small population is ____________________.
Question
List the five fundamental principles of HIPAA.
Question
The ______________________________ Act of 1986 is a collection of statutes that regulates the interception of wire,electronic,and oral communications.
Question
____________________ information is created by combining pieces of non-private data-often collected during software updates,and via cookies-that when combined may violate privacy.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/78
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Legal, Ethical, and Professional Issues in Information Security
1
The Information Systems Security Association (ISSA)is a nonprofit society of information security professionals whose primary mission is to bring together qualified information security practitioners for information exchange and educational development.
True
2
Every state has implemented uniform laws and regulations placed on organizational use of computer technology.
False
3
Established in January 2001,the National InfraGard Program began as a cooperative effort between the FBI's Cleveland Field Office and local technology professionals.
True
4
There are four general causes of unethical and illegal behavior.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
5
The key difference between laws and ethics is that ethics carry the authority of a governing body and laws do not.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
6
Studies on ethics and computer use reveal that people of different nationalities have different perspectives;difficulties arise when one nationality's ethical behavior violates the ethics of another national group.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
7
Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
8
DHS is made up of three directorates.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
9
The United States has implemented a version of the DMCA law called the Database Right,in order to comply with Directive 95/46/EC.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
10
The Secret Service is charged with the detection and arrest of any person committing a United States federal offense relating to computer fraud and false identification crimes.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
11
Thirty-four countries have ratified the European Council Cyber-Crime Convention as of April 2010.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
12
The NSA is responsible for signal intelligence and information system security.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
13
Cultural differences can make it easy to determine what is and is not ethical-especially when it comes to the use of computers.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
14
The Association for Computing Machinery and the Information Systems Security Association have the authority to banish violators of their ethical standards from practicing their trade.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
15
Studies have reported that the Pacific Rim countries of Singapore and Hong Kong are hotbeds of software piracy.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
16
HIPAA specifies particular security technologies for each of the security requirements to ensure the privacy of the health-care information.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
17
The difference between a policy and a law is that ignorance of a law is an acceptable defense.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
18
Due care requires that an organization make a valid effort to protect others and continually maintain this level of effort.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
19
The Clipper Chip can be used to monitor or track private communications.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
20
The Department of Homeland Security is the only U.S.federal agency charged with the protection of American information resources and the investigation of threats to,or attacks on,the resources.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
21
____ law regulates the structure and administration of government agencies and their relationships with citizens,employees,and other governments.

A)Public
B)Private
C)Civil
D)Criminal
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
22
____ law comprises a wide variety of laws that govern a nation or state.

A)Criminal
B)Civil
C)Public
D)Private
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
23
The U.S.Secret Service is a department within the Department of the Interior._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
24
The Federal Bureau of Investigation's National InfraGard Program serves its members in four basic ways: Maintains an intrusion alert network using encrypted e-mail;Maintains a secure Web site for communication about suspicious activity or intrusions;Sponsors local chapter activities;Operates a help desk for questions._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
25
The National Information Infrastructure Protection Act of 1996 modified which Act?

A)USA PATRIOT Act
B)USA PATRIOT Improvement and Reauthorization Act
C)Computer Security Act
D)Computer Fraud and Abuse Act
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
26
In a study on software licence infringement,those from United States were significantly more permissive._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
27
Deterrence can prevent an illegal or unethical activity from occurring._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
28
The communications networks of the United States carry more funds than all of the armored cars in the world combined._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
29
In 1995 the Directive 95/46/EC was adopted by the European Union._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
30
Intellectual privacy is recognized as a protected asset in the United States._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
31
The code of ethics put forth by (ISC)² focuses on four mandatory canons: "Protect society,the commonwealth,and the infrastructure;act honorably,honestly,justly,responsibly,and legally;provide diligent and competent service to principals;and advance and protect the profession."._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
32
The Department of Homeland Security was created in 1999._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
33
The Federal Privacy Act of 1974 regulates government agencies and holds them accountable if they release information about national security._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
34
Civil law addresses activities and conduct harmful to society and is actively enforced by the state._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
35
The Economic Espionage Act of 1996 protects American ingenuity,intellectual property,and competitive advantage._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
36
The Computer ____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.

A)Violence
B)Fraud
C)Theft
D)Usage
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
37
Ethics define socially acceptable behaviors._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
38
Privacy is not absolute freedom from observation,but rather is a more precise "state of being free from unsanctioned intrusion." _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
39
According to the National Information Infrastructure Protection Act of 1996,the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except ____.

A)for purposes of commercial advantage
B)for private financial gain
C)to harass
D)in furtherance of a criminal act
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
40
The Graham-Leach-Bliley Act is a critical piece of legislation that affects the executive management of publicly traded corporations and public accounting firms.______________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
41
Guidelines that describe acceptable and unacceptable employee behaviors in the workplace are known as ____________________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
42
____________________ is the legal obligation of an entity that extends beyond criminal or contract law.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
43
Criminal or unethical ____ goes to the state of mind of the individual performing the act.

A)attitude
B)intent
C)accident
D)ignorance
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?

A)Financial Services Modernization Act
B)Communications Act
C)Computer Security Act
D)Economic Espionage Act
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
45
____ attempts to prevent trade secrets from being illegally shared.

A)Electronic Communications Privacy Act
B)Sarbanes-Oxley Act
C)Financial Services Modernization Act
D)Economic Espionage Act
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following acts defines and formalizes laws to counter threats from computer related acts and offenses?

A)Electronic Communications Privacy Act of 1986
B)Freedom of Information Act (FOIA)
C)Computer Fraud and Abuse Act
D)Federal Privacy Act of 1974
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following acts is a collection of statutes that regulate the interception of wire,electronic,and oral communications?

A)Electronic Communications Privacy Act
B)Financial Services Modernization Ac
C)Sarbanes-Oxley Act
D)Economic Espionage Act
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
48
"Long arm ____________________" refers to the long arm of the law reaching across the country or around the world to draw an accused individual into its court systems.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
49
The ____ Portability and Accountability Act Of 1996,also known as the Kennedy-Kassebaum Act,protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.

A)Customer
B)Health Insurance
C)Computer
D)Telecommunications
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
50
The ____ of 1999 provides guidance on the use of encryption and provides protection from government intervention.

A)Sarbanes-Oxley Act
B)Gramm-Leach-Bliley Act
C)U.S.A.Patriot Act
D)Security and Freedom through Encryption Act
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
51
Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage ____.

A)with intent
B)by accident
C)with malice
D)with negligence
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
52
The Privacy of Customer Information Section of the common carrier regulation states that any proprietary information shall be used explicitly for providing services,and not for any ____ purposes.

A)troubleshooting
B)billing
C)customer service
D)marketing
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
53
What is the subject of the Sarbanes-Oxley Act?

A)Banking
B)Financial Reporting
C)Privacy
D)Trade secrets
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
54
____ defines stiffer penalties for prosecution of terrorist crimes.

A)USA Patriot Act
B)Sarbanes-Oxley Act
C)Gramm-Leach-Bliley Act
D)Economic Espionage Act
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
55
____________________ are rules that mandate or prohibit certain behavior in society.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
56
The Council of Europe adopted the Convention of Cybercrime in ____.

A)1976
B)1986
C)1998
D)2001
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources?

A)Australia
B)United States
C)Singapore
D)Sweden
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
58
Laws and policies and their associated penalties only deter if which of the following conditions is present?

A)Fear of penalty
B)Probability of being caught
C)Probability of penalty being administered
D)All of the above
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
59
What is the subject of the Computer Security Act?

A)Federal Agency Information Security
B)Telecommunications Common Carriers
C)Cryptography Software Vendors
D)Banking Industry
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
60
____________________ are the fixed moral attitudes or customs of a particular group.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
61
Software license infringement is also often called software ____________________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
62
The ____________________ Act seeks to improve the reliability and accuracy of financial reporting,as well as increase the accountability of corporate governance,in publicly traded companies.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
63
The ______________________________ contains a number of provisions focusing on facilitating affiliation among banks,securities firms,and insurance companies.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
64
The ________________________________________ is the American contribution to an international effort to reduce the impact of copyright,trademark,and privacy infringement,especially when accomplished via the removal of technological copyright protection measures.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
65
The ____________________ Act of 1996 attempts to prevent trade secrets from being illegally shared.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
66
The ___________________________________ is a respected professional society that was established in 1947 as "the world's first educational and scientific computing society."
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
67
The low overall degree of tolerance for ____________________ system use may be a function of the easy association between the common crimes of breaking and entering,trespassing,theft,and destruction of property to their computer-related counterparts.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
68
The ____________________ Act of 2001 provides law enforcement agencies with broader latitude in order to combat terrorism-related activities.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
69
Family law,commercial law,and labor law are all encompassed by ____________________ law.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
70
The ________________________________________________________________________________² manages a body of knowledge on information security and administers and evaluates examinations for information security certifications.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
71
The ________________________________________ Association is a professional association that focuses on auditing,control,and security and whose membership comprises both technical and managerial professionals.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
72
List three of the provisions included in the Security And Freedom Through Encryption Act of 1999.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
73
What are the requirements for a policy to become enforceable?
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
74
The _________________________ Act of 1966 allows any person to request access to federal agency records or information not determined to be a matter of national security.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
75
Key studies reveal that the overriding factor in leveling the ethical perceptions within a small population is ____________________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
76
List the five fundamental principles of HIPAA.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
77
The ______________________________ Act of 1986 is a collection of statutes that regulates the interception of wire,electronic,and oral communications.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
78
____________________ information is created by combining pieces of non-private data-often collected during software updates,and via cookies-that when combined may violate privacy.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 78 flashcards in this deck.